Web Apocrypha - testinghttp://webkit.sed.hu/taxonomy/term/60/0
enFuzzinator reloadedhttp://webkit.sed.hu/blog/20141023/fuzzinator-reloaded
<p>It's been a while since I last (and actually first) posted about Fuzzinator. Now I think that I have enough new experiences worth sharing.</p>
<p>More than a year ago, when I started fuzzing, I was mostly focusing on mutation-based fuzzer technologies since they were easy to build and pretty effective. Having a nice error-prone test suite (e.g. LayoutTests) was the warrant for fresh new bugs. At least for a while.</p>
<p><a href="http://webkit.sed.hu/blog/20141023/fuzzinator-reloaded" target="_blank">read more</a></p>http://webkit.sed.hu/blog/20141023/fuzzinator-reloaded#commentsblinkfuzzingtestingwebkitWed, 22 Oct 2014 22:38:01 +0000renata.hodovan67 at http://webkit.sed.huFuzzinator, a mutation and generation based browser fuzzerhttp://webkit.sed.hu/blog/20130710/fuzzinator-mutation-and-generation-based-browser-fuzzer
<p style="text-align: justify;">Fuzzers are widely used tools for testing software. They can generate random test cases and use them as input against the software under fuzzing/testing. Since the tests have randomly-built content, it is not necessary to check them for correctness, but they are suitable for catching rough bugs like use-after-frees, memory corruptions, assertion failures and further crashes. There are many approaches how to generate these tests, but all of them can be categorized into three main groups: whitebox, blackbox and graybox fuzzers.</p>
<p><a href="http://webkit.sed.hu/blog/20130710/fuzzinator-mutation-and-generation-based-browser-fuzzer" target="_blank">read more</a></p>http://webkit.sed.hu/blog/20130710/fuzzinator-mutation-and-generation-based-browser-fuzzer#commentsfuzzersecuritytestingWed, 10 Jul 2013 12:50:00 +0000renata.hodovan64 at http://webkit.sed.hu